Skip to content

Commit 214fcc7

Browse files
committed
Fix blocking issues
1 parent c3e36f8 commit 214fcc7

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/advisor/advisor-high-availability-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Azure Advisor helps you ensure and improve the continuity of your business-criti
1212

1313
## Check the version of your Check Point network virtual appliance image
1414

15-
Advisor can identify whether your virtual machine is running a version of the Check Point image that has been known to lose network connectivity during platform servicing operations. The Advisor recommendation will help you upgrade to a newer version of the image that addresses this problem. This check will ensure business continuity through better network connectivity.
15+
Advisor can identify whether your virtual machine is running a version of the Check Point image that has been known to lose network connectivity during platform servicing operations. The Advisor recommendation helps you upgrade to a newer version of the image that addresses this problem. This check ensures business continuity through better network connectivity.
1616

1717
## Ensure application gateway fault tolerance
1818

articles/azure-monitor/alerts/alerts-troubleshoot-log.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ If your log search alert didn't fire when it should have, check the following it
4242

4343
1. **Are the actions muted or was the alert rule configured to resolve automatically?**
4444

45-
A common issue is that you think that the alert didn't fire, but the rule was configured so that the alert would not fire. See the advanced options of the [log search alert rule](./alerts-create-log-alert-rule.md) to verify that both of the following are not selected:
45+
A common issue is that you think that the alert didn't fire, but the rule was configured so that the alert wouldn't fire. See the advanced options of the [log search alert rule](./alerts-create-log-alert-rule.md) to verify that both of the following aren't selected:
4646
* The **Mute actions** checkbox: allows you to mute fired alert actions for a set amount of time.
4747
* **Automatically resolve alerts**: configures the alert to only fire once per condition being met.
4848

@@ -149,7 +149,7 @@ A configured [log alert rule in Azure Monitor](./alerts-log.md) might be trigger
149149

150150
Logs are semi-structured data and are inherently more latent than metrics. If you're experiencing many misfires in fired alerts, consider using [metric alerts](alerts-types.md#metric-alerts). You can send data to the metric store from logs using [metric alerts for logs](alerts-metric-logs.md).
151151

152-
Log search alerts work best when you are try to detect specific data in the logs. They are less effective when you are trying to detect lack of data in the logs, like alerting on virtual machine heartbeat.
152+
Log search alerts work best when you're trying to detect specific data in the logs. They're less effective when you're trying to detect lack of data in the logs, like alerting on virtual machine heartbeat.
153153

154154

155155
## Error messages when configuring log search alert rules
@@ -164,24 +164,24 @@ If you receive this error message when creating or editing your alert rule query
164164

165165
See [Manage access to Log Analytics workspaces](../logs/manage-access.md) to learn more about permissions.
166166

167-
### One-minute frequency is not supported for this query
167+
### One-minute frequency isn't supported for this query
168168

169-
There are some limitations to using a one minute alert rule frequency. When you set the alert rule frequency to one minute, an internal manipulation is performed to optimize the query. This manipulation can cause the query to fail if it contains unsupported operations.
169+
There are some limitations to using a one-minute alert rule frequency. When you set the alert rule frequency to one minute, an internal manipulation is performed to optimize the query. This manipulation can cause the query to fail if it contains unsupported operations.
170170

171171
For a list of unsupported scenarios, see [this note](https://aka.ms/lsa_1m_limits).
172172

173173
### Failed to resolve scalar expression named <>
174174

175175
This error message can be returned when creating or editing your alert rule query if:
176176

177-
- You are referencing a column that doesn't exist in the table schema.
178-
- You are referencing a column that wasn't used in a prior project clause of the query.
177+
- You're referencing a column that doesn't exist in the table schema.
178+
- You're referencing a column that wasn't used in a prior project clause of the query.
179179

180180
To mitigate this, you can either add the column to the previous project clause or use the [columnifexists](https://learn.microsoft.com/azure/data-explorer/kusto/query/column-ifexists-function) operator.
181181

182-
### ScheduledQueryRules API is not supported for read only OMS Alerts
182+
### ScheduledQueryRules API isn't supported for read only OMS Alerts
183183

184-
This error message is returned when trying to update or delete rules created with the legacy API version by using the Azure Portal.
184+
This error message is returned when trying to update or delete rules created with the legacy API version by using the Azure portal.
185185

186186
1. Edit or delete the rule programmatically using the Log Analytics [REST API](./api-alerts.md).
187187
2. Recommended: [Upgrade your alert rules to use Scheduled Query Rules API](./alerts-log-api-switch.md) (legacy API is on a deprecation path).

0 commit comments

Comments
 (0)